openbsd-ports/textproc/xpdf/Makefile
brad 92fc00317d upgrade to xpdf 2.02pl1
fixes a flaw where an attacker can embed malicious hyperlinks that if
activated can execute arbitrary shell commands.

http://marc.theaimsgroup.com/?l=full-disclosure&m=105555332025253&w=2
2003-06-19 12:00:47 +00:00

37 lines
793 B
Makefile

# $OpenBSD: Makefile,v 1.34 2003/06/19 12:00:47 brad Exp $
COMMENT= "PDF viewer for X"
DISTNAME= xpdf-2.02pl1
CATEGORIES= textproc x11
MASTER_SITES= ftp://ftp.foolabs.com/pub/xpdf/
HOMEPAGE= http://www.foolabs.com/xpdf/
LIB_DEPENDS= t1x.3,t1.3::devel/t1lib
MAINTAINER= Brad Smith <brad@openbsd.org>
# GPL
PERMIT_PACKAGE_CDROM= Yes
PERMIT_PACKAGE_FTP= Yes
PERMIT_DISTFILES_CDROM= Yes
PERMIT_DISTFILES_FTP= Yes
USE_X11= Yes
USE_GMAKE= Yes
USE_MOTIF= openmotif
CONFIGURE_STYLE= gnu
CONFIGURE_ARGS= --with-gzip
CONFIGURE_ENV= CPPFLAGS="-I${X11BASE}/include/freetype2 -I${LOCALBASE}/include" \
LDFLAGS="-L${X11BASE}/lib -L${LOCALBASE}/lib"
NO_REGRESS= Yes
post-install:
@cd ${PREFIX}/bin && \
strip pdffonts pdfimages pdfinfo pdftopbm pdftops pdftotext xpdf
.include <bsd.port.mk>